首页 | 本学科首页   官方微博 | 高级检索  
     

可信操作系统中可信客体的研究
引用本文:谭良. 可信操作系统中可信客体的研究[J]. 计算机应用, 2008, 28(5): 1186-1189
作者姓名:谭良
作者单位:四川师范大学,计算机科学学院,成都,610066;中国科学院,计算技术研究所,北京,100080
基金项目:国家高技术研究发展计划(863计划) , 四川省科技攻关项目
摘    要:分析了操作系统中客体的类型,将客体分为静态客体和动态客体,然后总结了安全操作系统中对客体的处理存在的问题。在此基础路上,提出可信静态客体、可信动态客体和可信客体的概念,并分析了可信客体的特点以及与安全客体的关系。最后提出了在可信操作系统客体的可信需求。为下一步将要开展的工作奠定基础。

关 键 词:安全操作系统  客体  可信操作系统  可信静态客体  可信动态客体  可信客体
文章编号:1001-9081(2008)05-1186-04
收稿时间:2007-11-17
修稿时间:2007-11-17

Trusted objects in trusted operating system
TAN Liang. Trusted objects in trusted operating system[J]. Journal of Computer Applications, 2008, 28(5): 1186-1189
Authors:TAN Liang
Affiliation:TAN Liang1,2(1.School of Computer Science,Sichuan Normal University,Chengdu Sichuan 610066,China,2.Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100080,China)
Abstract:The object types in the operating system, which were sorted into the static object and the dynamic object, were analyzed, and some deficiencies in accessing the object in the security operating system were pointed out. Then, the concepts of the trusted static object, the trusted dynamic object and the trusted object were put forward, and the characteristics of the trusted object, the relationship between the secure object and the trusted object was addressed. Finally, some requirements for the trusted object, which needed to be resolved in the trusted operating system, were presented and discussed. All of these are the foundation for our future works.
Keywords:security operating system  object  trusted operating system  trusted static object  trusted dynamic object  trusted object
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号